A simple introduction to Cyber Security

English

Cybersecurity

Ethical Hacking

(748)

Project length: 1h 37m

Project Introduction:
These days you hear about one cyber attack or the other almost every day. While the internet has enabled us to connect with everyone and everything, it has also created opportunities for malicious users to steal vital data. Sometimes they steal bank details itself and transfer money while at other times they ask for money from the victim through ransomware. As a result it has become absolutely vital for both businesses and individuals to become aware of how attacks occur and how to defend themselves. The gap between demand and supply of cyber security professionals is still increasing since businesses are starting to realise the important of an information security department. Through this course we shall try to learn the tools and techniques used in hacking and and how to secure ourselves.

Overview

What are the requirements?

Good knowledge of networking.

Basic knowledge of programming and database management.

Intention to learn for security and without causing harm.

What is the target audience?:

Anyone and everyone who doesnt want to be a victim of malicious attacks and wants to learn how hackers actually attack in order to defend themselves.

When are the streaming sessions (streaming schedule)?

Saturday 2 PM EST

Project Outline

Session 1: Introduction to Cyber Security

What is Cyber Security?
What are the types of hackers?
Why is cyber security necessary?
Stages of Penetration Testing.

Session 2: Steps of Penetration Testing

*Reconnaissance
Active reconnaissance includes interacting directly with the target.
Passive reconnaissance When we are conducting passive reconnaissance, we are not interacting directly with the target and as such, the target has no way of knowing, recording, or logging our activity.

*Scanning This means scanning the system or network for vulnerabilities such as open ports or weak programming

*Exploitation This means using those vulnerabilities to gain access to the systems and escalating privileges

*Post Exploitation This means creating means to maintain access such as making a back for for future access

*Covering Tracks Once a system has been compromised the hacker needs to cover his tracks to avoid detection such as deleting logs

Reviews

Average rating

5(748 Reviews)

Invite a Friend

+200 LEDU

Education Ecosystem referral program offers you a great opportunity to earn additional LEDU by inviting Friends!